Mostrar el registro sencillo del ítem
dc.contributor.author | Power, Aurelia![]() |
es_ES |
dc.contributor.author | Keane, Anthony![]() |
es_ES |
dc.contributor.author | Nolan, Brian![]() |
es_ES |
dc.contributor.author | O'Neill, Brian![]() |
es_ES |
dc.date.accessioned | 2019-07-19T10:36:15Z | |
dc.date.available | 2019-07-19T10:36:15Z | |
dc.date.issued | 2019-07-16 | |
dc.identifier.uri | http://hdl.handle.net/10251/123822 | |
dc.description.abstract | [EN] In this paper we investigate the contribution of previous discourse in identifying elements that are key to detecting public textual cyberbullying. Based on the analysis of our dataset, we first discuss the missing cyberbullying elements and the grammatical structures representative of discourse-dependent cyberbullying discourse. Then we identify four types of discourse dependent cyberbullying constructions: (1) fully inferable constructions, (2) personal marker and cyberbullying link inferable constructions, (3) dysphemistic element and cyberbullying link inferable constructions, and (4) dysphemistic element inferable constructions. Finally, we formalise a framework to resolve the missing cyberbullying elements that proposes several resolution algorithms. The resolution algorithms target the following discourse dependent message types: (1) polarity answers, (2) contradictory statements, (3) explicit ellipsis, (4) implicit affirmative answers, and (5) statements that use indefinite pronouns as placeholders for thedysphemistic element. | es_ES |
dc.language | Inglés | es_ES |
dc.publisher | Universitat Politècnica de València | |
dc.relation.ispartof | Journal of Computer-Assisted Linguistic Research | |
dc.rights | Reconocimiento - No comercial - Sin obra derivada (by-nc-nd) | es_ES |
dc.subject | Cyberbullying | es_ES |
dc.subject | Discourse | es_ES |
dc.subject | Grammatical structures | es_ES |
dc.subject | Natural language processing | es_ES |
dc.title | The Role of Previous Discourse in Identifying Public Textual Cyberbullying | es_ES |
dc.type | Artículo | es_ES |
dc.date.updated | 2019-07-19T10:31:11Z | |
dc.identifier.doi | 10.4995/jclr.2019.11013 | |
dc.rights.accessRights | Abierto | es_ES |
dc.description.bibliographicCitation | Power, A.; Keane, A.; Nolan, B.; O'neill, B. (2019). The Role of Previous Discourse in Identifying Public Textual Cyberbullying. Journal of Computer-Assisted Linguistic Research. 3(3):1-20. https://doi.org/10.4995/jclr.2019.11013 | es_ES |
dc.description.accrualMethod | SWORD | es_ES |
dc.relation.publisherversion | https://doi.org/10.4995/jclr.2019.11013 | es_ES |
dc.description.upvformatpinicio | 1 | es_ES |
dc.description.upvformatpfin | 20 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 3 | |
dc.description.issue | 3 | |
dc.identifier.eissn | 2530-9455 | |
dc.description.references | Agne, R.R., and Tracy, K. (2009). "Conversation, Dialogue, and Discourse". In 21st Century Communication: A Reference Handbook, edited by W.F. Eadie, 177 - 185. Sage Publications Inc. https://doi.org/10.4135/9781412964005.n20 | es_ES |
dc.description.references | Al-garadi, M.A., Varathan, K.D. and Ravana S.D. 2016. "Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network." Computers in Human Behaviour, 63: 433 - 443. https://doi.org/10.1016/j.chb.2016.05.051 | es_ES |
dc.description.references | Allan, K. and Burridge, K. 2006. Forbidden Words: Taboo and Censoring of Language. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511617881 | es_ES |
dc.description.references | Boyd, D. 2007. "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life." In MacArthur Foundation Series on Digital Learning, Youth, Identity, and Digital Media, edited by David Buckingham, 1 - 26. Cambridge, MA: MIT Press. | es_ES |
dc.description.references | Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., and Vakali, A. 2017. "Mean Birds: Detecting Aggression and Bullying on Twitter." Cornell University Library: https://arxiv.org/abs/1702.06877. https://doi.org/10.1145/3091478.3091487 | es_ES |
dc.description.references | Chen, Y., Zhou, Y., Zhu, S. and Xu, H. 2012. "Detecting Offensive Language in Social Media to Protect Adolescent Online Safety." Paper presented at the ASE/IEEE International Conference on Social Computing, 71 - 80. Washington, DC, September 3-5. | es_ES |
dc.description.references | Dadvar, M., Trieschnigg, D., R. Ordelman, R., and de Jong, F. 2013. "Improving cyberbullying detection with user context." Paper presented at the 35th European conference on Advances in Information Retrieval, 693 - 696. Moscow, March 24-27. https://doi.org/10.1007/978-3-642-36973-5_62 | es_ES |
dc.description.references | de Marneffe, M.C., and Manning, C.D. 2008a. "The Stanford typed dependencies representation." Paper presented at the COLING 2008 Workshop on Cross-framework and Cross-domain Parser Evaluation. Manchester, UK August 23 - 23. https://doi.org/10.3115/1608858.1608859 | es_ES |
dc.description.references | de Marneffe, M.C., and Manning, C. 2008b. "Stanford typed dependencies manual." http://nlp.stanford.edu/software/stanford-dependencies.shtml. | es_ES |
dc.description.references | Dinakar, K., Jones, B., Havasi, C., Lieberman, H., and Picard, R. 2012. "Common sense reasoning for detection, prevention, and mitigation of cyberbullying." ACM Transactions on Interactive Intelligent Systems, 2: 18:1-18:30. doi: 10.1145/2362394.2362400. https://doi.org/10.1145/2362394.2362400 | es_ES |
dc.description.references | Dooley, J.J., Pyzalski, J., and Cross, D. 2009. "Cyberbullying versus face-to-face bullying - A theoretical and conceptual review." Journal of Psychology, 217: 182-188. doi: 10.1027/0044-3409.217.4.182. https://doi.org/10.1027/0044-3409.217.4.182 | es_ES |
dc.description.references | Goncalves, M. 2011. "Text Classification". In Modern Information Retrieval, the concepts and technology behind search, edited by Ricardo Baeza-Yates and Berthier Ribeiro-Neto, 281 - 336. Pearson Education Limited. | es_ES |
dc.description.references | Grigg, D.W. 2010. "Cyber-Aggression: Definition and Concept of Cyberbullying." Australian Journal of Guidance and Counselling, 12: 143-156. https://doi.org/10.1375/ajgc.20.2.143 | es_ES |
dc.description.references | Hinduja, S., and Patchin, J.W. 2009. Bullying beyond the schoolyard: preventing and responding to cyber-bullying. Thousand Oaks, CA: Corwin Press. | es_ES |
dc.description.references | Hosseinmardi, H., Han, R., Lv, Q., Mishra, S., and Ghasemianlangroodi, A. 2014a. "Towards Understanding Cyberbullying Behavior in a Semi-Anonymous Social Network." Paper presented at the International Conference on Advances in Social Networks Analysis and Mining. Beijing, August 17-20. https://doi.org/10.1109/ASONAM.2014.6921591 | es_ES |
dc.description.references | Hosseinmardi, H., Rafiq, R. I., Li, S., Yang, Z., Han, R., Lv, Q., and Mishra, S. 2014b. "A Comparison of Common Users across Instagram and Ask.fm to Better Understand Cyberbullying." Paper presented at the 7th International Conference on Social Computing and Networking. Sydney, December 3-5. | es_ES |
dc.description.references | Huang, Q., Singh, V.K., and Atrey, P.K. 2014. "Cyber Bullying Detection using Social and Textual Analysis." Paper presented at the 3rd International Workshop on Socially-Aware Multimedia, 3 - 6. Orlando, Florida, November 7. https://doi.org/10.1145/2661126.2661133 | es_ES |
dc.description.references | InternetSlang 2018. "Internet Slang - Internet Dictionary." Last modified October 1st. http://www.internetslang.com/. | es_ES |
dc.description.references | Kavanagh, P. 2014. "Investigation of Cyberbullying Language & Methods." MSc diss., ITB, Ireland. | es_ES |
dc.description.references | Kontostathis, A., Reynolds, K., Garron, A. and Edwards, L. 2013. Detecting Cyberbullying: Query Terms and Techniques. Paper presented at the 5th Annual ACM Web Science Conference. Paris, May 2-4. https://doi.org/10.1145/2464464.2464499 | es_ES |
dc.description.references | Krifka, M. (2001). "For a structured meaning account of questions and answers (revised version)". In Audiatur Vox Sapientia. A Festschrift for Arnim von Stechow, edited by C. Fery& W. Sternefeld 287-319. Berlin: Akademie Verlag (= studiagrammatica 52). | es_ES |
dc.description.references | Krifka, M. (2011). "Questions". In Semantics. An international handbook of Natural Language Meaning, edited by K. von Heusinger, C. Maienborn & P. Portner ,Vol. 2, 1742-1785. Berlin: Mouton de Gruyter. | es_ES |
dc.description.references | Langos, C. 2012. "Cyberbullying: The Challenge to Define." Cyberpsychology, Behavior, and Social Networks, 15(6): 285-289. doi: 10.1089/cyber.2011.0588. https://doi.org/10.1089/cyber.2011.0588 | es_ES |
dc.description.references | Livingstone, S.,Haddon, L., Görzig, A., and Ólafsson, K. 2011. "EU Kids Online: final report 2011." Last modified March 5th. http://eprints.lse.ac.uk/45490/. | es_ES |
dc.description.references | Livingstone, S., Mascheroni, G., Ólafsson, K., and Haddon, L. with the networks of EU Kids Online and Net Children Go Mobile 2014. "Children's online risks and opportunities: Comparative findings from EU Kids Online and Net Children Go Mobile". . Last modified March 5th. http://eprints.lse.ac.uk/60513/. | es_ES |
dc.description.references | Nahar, V., Li, X. and Pang, C. 2013. "An Effective Approach for Cyberbullying Detection." Communications in Information Science and Management Engineering, 3:238 - 247. | es_ES |
dc.description.references | Nandhini, B.S., and Sheeba, J.I. 2015. "Online Social Network Bullying Detection Using Intelligence Techniques." Procedia Computer Science, 45: 485 - 492. https://doi.org/10.1016/j.procs.2015.03.085 | es_ES |
dc.description.references | Navarro, G. and Ziviani, N. 2011. "Documents: Languages & Properties". In Modern Information Retrieval, the concepts and technology behind search, edited by Ricardo Baeza-Yates and Berthier Ribeiro-Neto, 203 - 254. Pearson Education Limited. | es_ES |
dc.description.references | Nitta, T., Masui, F., Ptaszynski, M., Kimura, Y., Rzepka, R., and Araki, K. 2013. "Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization." Paper presented at the 6th International Joint Conference on Natural Language Processing. Nagoya, October 14-19. | es_ES |
dc.description.references | Norvig (2007). "How to Write a Spelling Corrector." http://norvig.com/spell-correct.html. | es_ES |
dc.description.references | Oracle 2019. Java™ Platform, Standard Edition 9 API Specification. Last modified March 5th. Available online at https://docs.oracle.com/javase/9/docs/api/overview-summary.html. | es_ES |
dc.description.references | Power, A., Keane, A., Nolan, B., and O'Neill, B. (2017). "A Lexical Database for Public Textual Cyberbullying Detection". Special issue of Revista de lenguas para fines específicos, entitled New Insights into Meaning Construction and Knowledge Representation. | es_ES |
dc.description.references | Power, A., Keane, A., Nolan, B., and O'Neill, B. (2018). "Detecting Discourse-Independent Negated Forms of Cyberbullying". Journal of Computer-Assisted Linguistic Research, 2: 1 - 20. https://doi.org/10.4995/jclr.2018.8917 | es_ES |
dc.description.references | Prince, E.F. (1981). "Toward a taxonomy of given/new information". In Radical Pragmatics, edited by P. Cole, 223 - 254. Academic Press. | es_ES |
dc.description.references | Ptaszynski, M., Dybala, P., Matsuba, T., Rzepka, R. and Araki, K. 2010. "Machine Learning and Affect Analysis Against Cyber-Bullying." Paper presented at the 36th AISB Annual Convention. March 29- April 1. | es_ES |
dc.description.references | Ptaszynski, M., Masui, F., Nitta, T., Hatekeyama, S., Kimura, Y., Rzepka, R., and Araki, K. 2016. "Sustainable Cyberbullying Detection with Category-Maximised Relevance of Harmful Phrases and Double-Filtered Automatic Optimisation." International Journal of Child-Computer Interaction, 8: 15 - 30. https://doi.org/10.1016/j.ijcci.2016.07.002 | es_ES |
dc.description.references | Reynolds, K., Kontostathis, A. and Edwards, L. 2011. "Using Machine Learning to Detect Cyberbullying." Paper presented at the 10th International Conference on Machine Learning and Applications Workshops. Hawaii, December 18-21. https://doi.org/10.1109/ICMLA.2011.152 | es_ES |
dc.description.references | Sourander, A., Brunstein-Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., Hans Helenius, H. 2010. "Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study." Arch Gen Psychiatry, 67: 720-728. https://doi.org/10.1001/archgenpsychiatry.2010.79 | es_ES |
dc.description.references | Unicode 2018. "Emoticons." Last modified October 1st. http://www.unicode.org/. | es_ES |
dc.description.references | Van Hee, C., Lefever, E.,Verhoeven, B.,Mennes, J.,Desmet, B., DePauw, G., Daelemans, W., and Hoste, V. 2015. "Detection and Fine-GrainedClassificationofCyberbullyingEvents." Paper presented at the annual conference on RANLP. Hissar, September 5-11. | es_ES |
dc.description.references | Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., and Edwards, L. 2009. "Detection of harassment on web 2.0." Paper presented at the 1st conference on CAW. Madrid, April 20-24. | es_ES |